Trade-Offs in Distributed Interactive Proofs
Total Page:16
File Type:pdf, Size:1020Kb
View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Dagstuhl Research Online Publication Server Trade-Offs in Distributed Interactive Proofs Pierluigi Crescenzi IRIF – CNRS and Université de Paris, France [email protected] Pierre Fraigniaud IRIF – CNRS and Université de Paris, France [email protected] Ami Paz IRIF – CNRS and Université de Paris, France Faculty of Computer Science, University of Vienna, Austria [email protected] Abstract The study of interactive proofs in the context of distributed network computing is a novel topic, recently introduced by Kol, Oshman, and Saxena [PODC 2018]. In the spirit of sequential interactive proofs theory, we study the power of distributed interactive proofs. This is achieved via a series of results establishing trade-offs between various parameters impacting the power of interactive proofs, including the number of interactions, the certificate size, the communication complexity, and the form of randomness used. Our results also connect distributed interactive proofs with the established field of distributed verification. In general, our results contribute to providing structure to the landscape of distributed interactive proofs. 2012 ACM Subject Classification Theory of computation → Distributed computing models; Theory of computation → Interactive proof systems; Theory of computation → Distributed algorithms Keywords and phrases Distributed interactive proofs, Distributed verification Digital Object Identifier 10.4230/LIPIcs.DISC.2019.13 Related Version A full version of the paper is available at https://arxiv.org/abs/1908.03363. Funding Pierre Fraigniaud: Additional support from the INRIA project GANG, and from the ANR project DESCARTES. Ami Paz: Supported by the Fondation des Sciences Mathématiques de Paris. Acknowledgements The authors are thankful to Gianlorenzo D’Angelo for fruitful discussions on the topic of this paper, and to Amir Yehudayoff for discussion on his work [27]. 1 Introduction This paper is concerned with distributed network computing, in which n processing nodes occupy the n vertices of a connected simple graph G, and communicate through the edges of G. In this context, distributed decision [25] refers to the task in which the nodes have to collectively decide whether the network G satisfies some given graph property, which may refer also to input labels given to the nodes (basic examples of such tasks are whether the network is acyclic or whether the network is properly colored). If the property is satisfied then all nodes must accept, otherwise at least one node must reject. Distributed decision finds immediate applications to distributed fault-tolerant computing, in which the nodes must check whether the current network configuration is in a legal state with respect to some Boolean predicate [22]. (If this is not the case, the rejecting node(s) may raise an alarm or launch a recovery procedure.) © Pierluigi Crescenzi, Pierre Fraigniaud, and Ami Paz; licensed under Creative Commons License CC-BY 33rd International Symposium on Distributed Computing (DISC 2019). Editor: Jukka Suomela; Article No. 13; pp. 13:1–13:17 Leibniz International Proceedings in Informatics Schloss Dagstuhl – Leibniz-Zentrum für Informatik, Dagstuhl Publishing, Germany 13:2 Trade-Offs in Distributed Interactive Proofs While some properties (e.g., whether a given coloring is proper) are locally decidable (LD) by exchanging information between neighbors only, other properties are not (e.g., whether the network is acyclic, or whether a given set of pointers forms a spanning tree of the network). As a remedy, the notion of proof-labeling scheme (PLS) was introduced [22], and variants were considered, including non-deterministic local decision (NLD) [14], and locally checkable proofs (LCP) [18]. All these settings assume the existence of a prover assigning certificates to the nodes, and a distributed verifier in charge of verifying that these certificates form a distributed proof that the network satisfies some given property. For instance, acyclicness can be certified by a prover picking one arbitrary node u, and assigning to each node v a certificate c(v) equal its distance to u. The distributed verifier running at every node v checks that v has one neighbor w satisfying c(w) = c(v) − 1, and all its other neighbors w0 satisfying c(w0) = c(v) + 1. If the network contains a cycle, then these equalities will be violated in at least one node. Note that the prover is not necessarily an abstract entity, as an algorithm constructing some distributed data structure (e.g., a spanning tree) may construct in parallel a proof that this data structure is correct. Interestingly, all (Turing decidable) graph properties can be certified by PLS and LCP with O(n2)-bits certificates [22], and this is tight [18]– for instance, symmetry1 (Sym) was shown to require Ω(n2)-bit certificates. However, not only such universal certification requires high space complexity at the nodes for storing large certificates, it also requires high communication complexity between neighbors for verifying the correctness of these certificates. Hence, the concern is minimizing the size of the certificates for specific graph properties, e.g., minimum-weight spanning trees (MST) [21]. Recently, the notion of randomized proof-labeling schemes (RPLS) was introduced [15]. RPLS assumes that the distributed verifier is randomized, and the global verdict provided by the nodes about the correctness of the network configuration should hold with probability at least 2/3. Such randomized distributed verification schemes were proven to be very efficient in terms of communication complexity (with O(log n)-bit messages exchanged between neighbors), but this often holds at the cost of actually increasing the size of the certificates provided by the prover. Another recent direction for reducing the certificate size introduces a local hierarchy of complexity classes defined by alternating quantifiers (similarly to the polynomial hierar- chy [28]) for local decision [11]. Interestingly, many properties requiring Ω(n2)-bit certificates with a locally checkable proof stand at the bottom levels of this hierarchy, with O(log n)-bit certificates. This is for instance the case of non 3-colorability (3Col), which stands at the second level of the hierarchy, and Sym, which stands at the third level of the hierarchy. More generally, all monadic second order graph properties belong to this hierarchy with O(log n)-bit certificates. However, it is not clear how to implement the protocols resulting from this hierarchy. Even more recently, a very original and innovative approach was adopted [20, 24], bearing similarities with the local hierarchy but perhaps offering more algorithmic flavor. This approach considers distributed interactive proofs. Such proofs consist of a constant number of interactions between a centralized prover M (a.k.a. Merlin) and a randomized distributed verifier A (a.k.a. Arthur). For instance, a dAM protocol is a protocol with two interactions: Arthur queries Merlin by sending a random string, and Merlin replies to this query by sending a certificate. Similarly, a dMAM protocol involves three interactions: Merlin provides a 1 G is symmetric if G has a non trivial automorphism, i.e., a one-to-one mapping from the set of nodes to itself preserving edges, and distinct from the identity map. P. Crescenzi, P. Fraigniaud, and A. Paz 13:3 certificate to Arthur, then Arthur queries Merlin by sending a random string, and finally Merlin replies to Arthur’s query by sending another certificate. This series of interactions is followed by a phase of distributed verification performed between every node and its neighbors, which may be either deterministic or randomized. Although the interactive model seems weaker than the alternation of quantifiers in the local hierarchy, many properties requiring Ω(n2)-bits certificates with a locally checkable proof admit an Arthur-Merlin protocol with small certificates, and very few interactions. For instance, this is the case of Sym that admits a dMAM protocol with O(log n)-bit certificates, and a dAM protocol with O(n log n)-bit certificates [20] (on the other hand, any dAM protocol for Sym requires Ω(log log n)-bit certificates [20]). It is also known that non symmetry (Sym) can be decided by a dAMAM protocol with O(log n)-bit certificates [24]. These results raise several interesting questions, such as: 1. Are there ways to establish trade-offs between space complexity (i.e., the size of the certificates) and communication complexity (i.e., the size of the messages exchanged between nodes)? The dMA protocols [20] as well as the RPLS protocols [15] enable to gain a lot in terms of message complexity, but at the cost of still high space complexity. Would it be possible to compromise between these two complexities? In particular, would it be possible to reduce the certificate size at the cost of increasing the communication complexity? 2. The theory of distributed decision has somehow restricted itself to distributed randomness, in the sense that each node has only access to a private source of random coins. These coins are public to the prover, but remain private to the other nodes. Shared randomness is known to be stronger than private randomness for communication complexity, as witnessed by, e.g., deciding equality [23]. How much shared randomness could help in the context of distributed decision? 3. Last but not least, are there general reduction theorems between Arthur-Merlin classes for trading the number of interactions with the certificate size? In the centralized setting, it is known that AM[k] = AM[2] for any k ≥ 2, but it is not known whether a similar claim holds in the distributed setting [20]. Also, in the centralized setting the Sipser–Lautemann theorem tells us that MA ⊆ Σ2 ∩ Π2 and MA ⊆ AM ⊆ Π2, but it is not known whether the distributed Arthur-Merlin classes stand so low in the local alternating hierarchy too. Our Results In this paper, we study the power of distributed interactive proofs.